SlideShare a Scribd company logo
Lecture #22: Web Privacy & Security Breach
Dr.Ramchandra Mangrulkar
September 17, 2020
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 1 / 13
Web Privacy
A user can visit websites, send messages, and interact with
applications without revealing an identity. True or False ?
Internet privacy is becoming a growing concern these days for
people of all ages.
Companies track your behavior across websites to serve you with
highly relevant advertisements.
Governments monitor every move you make to predict your
behavior and control you better.
Instant connectivity has changed the way we live and work for
the better, but this convenience comes at a very big price:
your privacy!
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 2 / 13
What is Internet Privacy of Web Privacy?
Internet privacy, also commonly referred to as online privacy, is a
subset of data privacy and a fundamental human right.
Basically, it refers to the personal privacy that you’re entitled to
when you display, store, or provide information regarding yourself
on the Internet.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 3 / 13
Internet Privacy Issues
Tracking
-based on your earlier web searches or visits to websites.
Surveillance
-allows the government to legally monitor the Internet usage of
its citizens.
Theft
-Cybercriminals use malware, spyware, and phishing techniques
for Identity Theft
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 4 / 13
Behaviors That Impact Privacy
Using the Same Credentials for Multiple Accounts
Staying Logged into Websites
Using Services without Reading their Terms Conditions
Opening Suspicious Attachments or Downloading Malicious Files
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 5 / 13
Protecting Privacy
Clean computing matters
-Backing up your data
-Protect against malware
-Regularly Update software
-Update your passwords
Check and remove digital footprint
-Search Name in search engines
-Double-check your privacy settings
Educate yourself and your family about social networking
Wipe digital data
social media privacy -read Terms and Conditions
-don’t share private information
-careful about posting photos
-Adjust the social media platform’s privacy
-Know personal data, social media sites store and share
-Carefully select personal details
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 6 / 13
Protecting Privacy : Tips
Don’t overshare on social media
Create strong passwords
Browse in incognito or private mode
Use a different search engine
Use a virtual private network
Secure Your Web Browser
Be careful where you click
Secure your mobile devices
Use quality antivirus software
Delete Cookies at Browser Exit
Use HTTPS
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 7 / 13
Protecting Privacy : Tips
Encrypt data during Cloud Backup
Secure Online Communications
Share Online Files Securely
Watch Bluetooth vulnerabilities
Keep operating system up to date
Wise up to Wi-Fi
Delete unused data
Familiarize with phishing
Block Cookies
Unlink Accounts
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 8 / 13
Security Breatch
A security breach occurs when an intruder gains unauthorized access
to an organization’s protected systems and data.
Cybercriminals or malicious applications bypass security mechanisms
to reach restricted areas.
A security breach is an early-stage violation that can lead to things
like system damage and data loss.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 9 / 13
Security Breatch
Attackers can initiate different types of security breaches.
Viruses, spyware, and other malware -Cybercriminals often use
malicious software to break in to protected networks.
Impersonation of an organization
-Cybercriminals may send a bogus, but convincing email to an
employee of an organization
-The email is made to appear like it’s from an executive with an
urgent request for, say, employment records, log-in information,
or other sensitive data.
-Eager to fill the request, the employee may email back the
information — putting it in the hands of cybercriminals.
Denial of service (DDoS) attacks
-A denial-of-service attack is capable of crashing websites
-Hackers can make a website — or a computer — unavailable by
flooding it with traffic.
-overwhelm an organization’s security devices and its ability to
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 10 / 13
Security breach or data breach?
A security breach happens first. A data breach may follow.
A security breach occurs when an unauthorized party bypasses
security measures to reach protected areas of a system.
A security breach can put the intruder within reach of valuable
information — company accounts, intellectual property, the
personal information of customers that might include names,
addresses, Social Security numbers, and credit card information.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 11 / 13
Examples : security breach
A security breach happens first. A data breach may follow.
The Yahoo security breach began with a spear-phishing email
sent in early 2014. A Yahoo company employee clicked on a link,
giving hackers access to the company’s network. Three Yahoo
breaches in total gave cybercriminals access to 3 billion user
accounts. Yahoo announced the first breach in 2016.
Equifax security breach
The data breach at Equifax, one of the nation’s largest credit
reporting companies, exposed the personal information of more
than 145 million Americans.
Cybercriminals exploited a website application vulnerability.
Unauthorized access to data occurred from between May and
July 2017. Equifax announced the cybersecurity incident on
September 7, 2017.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 12 / 13
Examples : security breach
Facebook security breach
Facebook, in September 2018, announced an attack on its
computer network. The personal information of nearly 29 million
users was exposed. Cybercriminals exploited three software flaws
in Facebook’s system.
Hackers were able to break into user accounts that included
those of Facebook CEO Mark Zuckerberg and Chief Operating
Officer Sheryl Sandberg.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 13 / 13

More Related Content

PDF
Lecture #24 : Cross Site Request Forgery (CSRF)
PDF
How To Protect Your Website From Bot Attacks
PDF
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
PPTX
Data protection on premises, and in public and private clouds
PPTX
What is the Cybersecurity plan for tomorrow?
PDF
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
PDF
[Infographic] Data Loss Prevention
PPTX
Websecurity fundamentals for beginners
Lecture #24 : Cross Site Request Forgery (CSRF)
How To Protect Your Website From Bot Attacks
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
Data protection on premises, and in public and private clouds
What is the Cybersecurity plan for tomorrow?
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
[Infographic] Data Loss Prevention
Websecurity fundamentals for beginners

What's hot (20)

DOCX
Case study on JP Morgan Chase & Co
PDF
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
PDF
[Infographic] 7 Cyber attacks that shook the world
DOCX
A Case study scenario on collaborative Portal Risk Assessment
PPTX
Web Security
PPTX
5 Cybersecurity threats in Public Sector
PDF
PPTX
Data Protection & Privacy During the Coronavirus Pandemic
PDF
Top 5 Cybersecurity Risks in Banking
PPTX
Top 5 Cybersecurity Threats in Retail Industry
PDF
Fundamentals of information systems security ( pdf drive ) chapter 1
PDF
Current Issue: February 2020, Volume 10, Number 1 --- Table of Contents
PPT
Web security presentation
PDF
Multi level parsing based approach against phishing attacks with the help of ...
PPT
Web security leeds sharp dot netnotts
PDF
IRJET- Phishing Website Detection based on Machine Learning
PPT
Microsoft warns of potential attacks
PDF
Banking and Modern Payments System Security Analysis
PDF
Detecting phishing websites using associative classification (2)
PDF
IRJET- Survey on Web Application Vulnerabilities
Case study on JP Morgan Chase & Co
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
[Infographic] 7 Cyber attacks that shook the world
A Case study scenario on collaborative Portal Risk Assessment
Web Security
5 Cybersecurity threats in Public Sector
Data Protection & Privacy During the Coronavirus Pandemic
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Threats in Retail Industry
Fundamentals of information systems security ( pdf drive ) chapter 1
Current Issue: February 2020, Volume 10, Number 1 --- Table of Contents
Web security presentation
Multi level parsing based approach against phishing attacks with the help of ...
Web security leeds sharp dot netnotts
IRJET- Phishing Website Detection based on Machine Learning
Microsoft warns of potential attacks
Banking and Modern Payments System Security Analysis
Detecting phishing websites using associative classification (2)
IRJET- Survey on Web Application Vulnerabilities
Ad

Similar to Lecture #22: Web Privacy & Security Breach (20)

PPTX
Cyber LawPPT on engineering and technology
PPTX
Cyber crime (2018 )updated
PPTX
Cyber Security Training in Office Environment
PPTX
Final Presentation.pptx
PPTX
Empowerment Technologies - Lesson 2: ONLINE SAFETY-SECURITY-ETHICS-AND-ETIQUETTE
PPTX
Cybersecurity2021
PDF
Cyber Security
PPTX
DATA BREACH ANDvggghhu CYBER ATTACK.pptx
PDF
A Review Paper on Cyber-Security
PPTX
Introduction to intelligence cybersecurity_2
PPTX
Cyber Security PPT.pptx
PDF
introduction to cyber security
PPTX
Introduction to cyber security
PDF
A Guide to Internet Security For Businesses- Business.com
PPT
Cyber law and password protection
PPTX
Cyber security threats and its solutions
PDF
A Cybersecurity and Digital Risk Assessment: A Family Case Study
PPTX
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
PDF
cyber security.pdf
PDF
Cyber security
Cyber LawPPT on engineering and technology
Cyber crime (2018 )updated
Cyber Security Training in Office Environment
Final Presentation.pptx
Empowerment Technologies - Lesson 2: ONLINE SAFETY-SECURITY-ETHICS-AND-ETIQUETTE
Cybersecurity2021
Cyber Security
DATA BREACH ANDvggghhu CYBER ATTACK.pptx
A Review Paper on Cyber-Security
Introduction to intelligence cybersecurity_2
Cyber Security PPT.pptx
introduction to cyber security
Introduction to cyber security
A Guide to Internet Security For Businesses- Business.com
Cyber law and password protection
Cyber security threats and its solutions
A Cybersecurity and Digital Risk Assessment: A Family Case Study
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
cyber security.pdf
Cyber security
Ad

More from Dr. Ramchandra Mangrulkar (20)

PDF
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
PDF
Introduction to Research and Publications Tools.pdf
PDF
Blockchain#2.pdf
PDF
Blockchain#1.pdf
PDF
Blockchain#3.pdf
PDF
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
PDF
Lecture #32: Forensic Duplication
PDF
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
PDF
LEcture #28-#30
PDF
Lecture #31 : Windows Forensics
PDF
Lecture #25 : Oauth 2.0
PDF
Lecture #22 : Web Privacy & Security Breach
PDF
Lecture #21: HTTPS , SSL & TLS
PDF
Lecture #18 - #20: Web Browser and Web Application Security
PDF
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
PDF
Lecture # 14: Salami and Linearization Attacks
PDF
Lecture #12,#13 : Program and OS Security -Part I
PDF
Lecture #9 : Single Sign on and Federation Identity Management
PDF
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
PDF
Lecture #6: Multilevel Security Models
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
Introduction to Research and Publications Tools.pdf
Blockchain#2.pdf
Blockchain#1.pdf
Blockchain#3.pdf
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Lecture #32: Forensic Duplication
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
LEcture #28-#30
Lecture #31 : Windows Forensics
Lecture #25 : Oauth 2.0
Lecture #22 : Web Privacy & Security Breach
Lecture #21: HTTPS , SSL & TLS
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture # 14: Salami and Linearization Attacks
Lecture #12,#13 : Program and OS Security -Part I
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #6: Multilevel Security Models

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPT
Project quality management in manufacturing
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Well-logging-methods_new................
PPTX
web development for engineering and engineering
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
DOCX
573137875-Attendance-Management-System-original
PPTX
Sustainable Sites - Green Building Construction
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Project quality management in manufacturing
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Lecture Notes Electrical Wiring System Components
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Well-logging-methods_new................
web development for engineering and engineering
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CH1 Production IntroductoryConcepts.pptx
UNIT 4 Total Quality Management .pptx
additive manufacturing of ss316l using mig welding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
573137875-Attendance-Management-System-original
Sustainable Sites - Green Building Construction
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Automation-in-Manufacturing-Chapter-Introduction.pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Operating System & Kernel Study Guide-1 - converted.pdf

Lecture #22: Web Privacy & Security Breach

  • 1. Lecture #22: Web Privacy & Security Breach Dr.Ramchandra Mangrulkar September 17, 2020 Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 1 / 13
  • 2. Web Privacy A user can visit websites, send messages, and interact with applications without revealing an identity. True or False ? Internet privacy is becoming a growing concern these days for people of all ages. Companies track your behavior across websites to serve you with highly relevant advertisements. Governments monitor every move you make to predict your behavior and control you better. Instant connectivity has changed the way we live and work for the better, but this convenience comes at a very big price: your privacy! Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 2 / 13
  • 3. What is Internet Privacy of Web Privacy? Internet privacy, also commonly referred to as online privacy, is a subset of data privacy and a fundamental human right. Basically, it refers to the personal privacy that you’re entitled to when you display, store, or provide information regarding yourself on the Internet. Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 3 / 13
  • 4. Internet Privacy Issues Tracking -based on your earlier web searches or visits to websites. Surveillance -allows the government to legally monitor the Internet usage of its citizens. Theft -Cybercriminals use malware, spyware, and phishing techniques for Identity Theft Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 4 / 13
  • 5. Behaviors That Impact Privacy Using the Same Credentials for Multiple Accounts Staying Logged into Websites Using Services without Reading their Terms Conditions Opening Suspicious Attachments or Downloading Malicious Files Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 5 / 13
  • 6. Protecting Privacy Clean computing matters -Backing up your data -Protect against malware -Regularly Update software -Update your passwords Check and remove digital footprint -Search Name in search engines -Double-check your privacy settings Educate yourself and your family about social networking Wipe digital data social media privacy -read Terms and Conditions -don’t share private information -careful about posting photos -Adjust the social media platform’s privacy -Know personal data, social media sites store and share -Carefully select personal details Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 6 / 13
  • 7. Protecting Privacy : Tips Don’t overshare on social media Create strong passwords Browse in incognito or private mode Use a different search engine Use a virtual private network Secure Your Web Browser Be careful where you click Secure your mobile devices Use quality antivirus software Delete Cookies at Browser Exit Use HTTPS Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 7 / 13
  • 8. Protecting Privacy : Tips Encrypt data during Cloud Backup Secure Online Communications Share Online Files Securely Watch Bluetooth vulnerabilities Keep operating system up to date Wise up to Wi-Fi Delete unused data Familiarize with phishing Block Cookies Unlink Accounts Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 8 / 13
  • 9. Security Breatch A security breach occurs when an intruder gains unauthorized access to an organization’s protected systems and data. Cybercriminals or malicious applications bypass security mechanisms to reach restricted areas. A security breach is an early-stage violation that can lead to things like system damage and data loss. Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 9 / 13
  • 10. Security Breatch Attackers can initiate different types of security breaches. Viruses, spyware, and other malware -Cybercriminals often use malicious software to break in to protected networks. Impersonation of an organization -Cybercriminals may send a bogus, but convincing email to an employee of an organization -The email is made to appear like it’s from an executive with an urgent request for, say, employment records, log-in information, or other sensitive data. -Eager to fill the request, the employee may email back the information — putting it in the hands of cybercriminals. Denial of service (DDoS) attacks -A denial-of-service attack is capable of crashing websites -Hackers can make a website — or a computer — unavailable by flooding it with traffic. -overwhelm an organization’s security devices and its ability to Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 10 / 13
  • 11. Security breach or data breach? A security breach happens first. A data breach may follow. A security breach occurs when an unauthorized party bypasses security measures to reach protected areas of a system. A security breach can put the intruder within reach of valuable information — company accounts, intellectual property, the personal information of customers that might include names, addresses, Social Security numbers, and credit card information. Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 11 / 13
  • 12. Examples : security breach A security breach happens first. A data breach may follow. The Yahoo security breach began with a spear-phishing email sent in early 2014. A Yahoo company employee clicked on a link, giving hackers access to the company’s network. Three Yahoo breaches in total gave cybercriminals access to 3 billion user accounts. Yahoo announced the first breach in 2016. Equifax security breach The data breach at Equifax, one of the nation’s largest credit reporting companies, exposed the personal information of more than 145 million Americans. Cybercriminals exploited a website application vulnerability. Unauthorized access to data occurred from between May and July 2017. Equifax announced the cybersecurity incident on September 7, 2017. Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 12 / 13
  • 13. Examples : security breach Facebook security breach Facebook, in September 2018, announced an attack on its computer network. The personal information of nearly 29 million users was exposed. Cybercriminals exploited three software flaws in Facebook’s system. Hackers were able to break into user accounts that included those of Facebook CEO Mark Zuckerberg and Chief Operating Officer Sheryl Sandberg. Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 13 / 13